Universal Access To All Knowledge
Home Donate | Store | Blog | FAQ | Jobs | Volunteer Positions | Contact | Bios | Forums | Projects | Terms, Privacy, & Copyright
Search: Advanced Search
Anonymous User (login or join us)
Upload
Search Results
Results: 1 through 50 of 213 (0.002 secs)
You searched for: subject:"Recon"
[1] 2 3 4 5     Next    Last
[movies]Recon film - Mark Broughton
recon film for Spits
Keywords: recon
Downloads: 119
[audio]The Tech Recon - Cody Krieger
A podcast about tech. All the biggest stories, and some of the smaller ones too.
Keywords: tech; tech recon; recon
Downloads: 307
[texts]Ghost Recon
Team Ghost is a select group of four celebrity gamers brought together to promote the highly anticipated video game, Tom Clancy's Ghost Recon Future Soldier. Tom Clancy's Ghost Recon Future Soldier is a near future military shooter video game, coming on Playstation 3 and Xbox 360 in 2012. Ghost Recon Advanced Warfighter Game Guide Walkthrough - free video game guide and walkthrough. Solutions, secrets, maps, tips and lots more...
Keywords: Ghost Recon
Downloads: 13
[movies]Recon 2011 - How to develop a rootkit for Broadcom NetExtreme network cards by Guillaume Delugré - Recon
(Bug: if the video is black use the QuickTime video instead) Among all possible devices, network cards are particularly interesting for a attacker wishing to develop a rootkit : - They offer direct communication with the attacker over the network link - They offer direct memory access to kernel physical pages over the PCI link Despite the fact that the feasability of a rootkit in a network card had already been considered (A...
Keywords: Recon; Rootkit
Downloads: 337
[movies]Recon 2011 - Mach shellcodes and OS X injectable rootkits by Jesse D'Aguanno
Mach shellcodes and OS X injectable rootkits The mach subsystem on OS X has several interfaces which can be leveraged by an attacker to subvert the OS and write directly to the memory of other processes, including the kernel, allowing us to replace code, overwrite data structures, etc. I demonstrated some of these techniques and an example OS X kernel rootkit ("iRK") a couple of years ago at Black Hat...
Keywords: recon; rootkit
Downloads: 238
[movies]Recon 2013 - Reconstructing Gapz: Position-Independent Code Analysis Problem by Aleksandr Matrosov and Eugene Rodionov - Recon
This presentation is devoted to analysis one of the stealthiest bootkit seen in the wild – Win32/Gapz. The talk will cover not only remarkable features of the bootkit such as custom kernel-mode network protocol implementation, advanced bootkit technique and payload injection functionality but, also, the way the authors of the presentation approached the problem of analysis Win32/Gapz using the tools by Hex-Rays...
Keywords: Recon; Recon 2013; Reverse Engineering
Downloads: 126
[movies]lecture: Keep your tentacles off my bus, introducing Die Datenkrake by Dmitry Nedospasov and Thorsten Schröder - Recon
In hardware security analysis, success and failure are predetermined by one's tools. Coping with overwhelming streams of data can be near impossible in software alone. Implementing accurate timing can also prove to be challenging without a custom logic implementation. The solution to many of these issues is offloading much of the work to purpose-built dedicated logic. In this talk we introduce Die Datenkrake (DDK) a low-cost open source hardware project for hardware reverse engineering that impl...
Keywords: Recon; Recon 2013; Reverse Engineering
Downloads: 54
[movies]Recon 2013 - Apple iCloud services reversed inside out by Oleg Afonin - Recon
Apple iCloud was meant to improve flexibility and comfort when using your iDevices, however it also provides opportunities to extract as much as everything about the user. Apple iCloud was meant to improve flexibility and comfort when using your iDevices, however it also provides opportunities to extract as much as everything about the user. Backups: iCloud suggests backing up iMessage, SMS, photos and videos, device settings, documents, music and other things on-the-fly which is useful for sync...
Keywords: Recon; Recon 2013; Reverse Engineering
Downloads: 247
[movies]Recon 2013 - Hiding @ Depth - Exploring & Subverting NAND Flash memory by Josh "m0nk" Thomas - Recon
In the world of digital storage, gone are the days of spinning platters and magnetic residue. These technologies have been replaced with electron trapping, small voltage monitoring and a lot of magic. These NAND devices are ubiquitous across our culture; from smart phones to laptops to USB memory sticks to GPS navigation devices. We carry many of these devices in our pockets daily without considering the security implications...
Keywords: Recon; Recon 2013; Reverse Engineering
Downloads: 101
[movies]Recon 2013 - I got 99 problems but a kernel pointer ain't one by Alex Ionescu
While Windows has been becoming a tighter and tighter ship with increased mitigations added each release, the local availability of kernel addresses has barely been addressed, except in the context of some ASLR bypasses in Windows 8. This presentation will collect many of the already-known info leaks in one single source, and then proceed by presenting some unknown and novel info leaks in the kernel...
Keywords: Recon; Recon 2013; Reverse Engineering; Alex Ionescu
Downloads: 106
[movies]Recon 2011 Gregory Kerr - Checkpoint-Restart: Proprietary Hardware and the "Spiderweb API"
Checkpoint-Restart: Proprietary Hardware and the "Spiderweb API" This summary describes a package to transparently checkpoint and restart applications which run over Infiniband. Infiniband is rapidly growing as a high-speed interconnect, even appearing on departmental clusters. The current work grew out of the needs of high performance computing. As of November, 2010, 43% of the TOP500 supercomputers run Infiniband...
Keywords: Recon 2011, Recon, Reverse Engineering, Infiniband
Downloads: 54
[movies]Action Force Recon - Nathan
Homemade WW2 movie
Keywords: Action; force; recon
Downloads: 226
[texts]Jauja 24 ( Diciembre 1968)
Jauja 24 recon
Keywords: Jauja 24 recon
Downloads: 3
[texts]16 17 Abril Mayo 1968
Jauja 16,17 recon..
Keywords: Jauja 16; 17 recon
[texts]Jauja 22 ( Octubre 1968)
Jauja 22 recon
Keywords: Jauja 22 recon
Downloads: 1
[movies]Action Force Recon - Nathan
homemade WW2 movie
Keywords: Action Force Recon
Downloads: 259
[movies]Recon 2005 - Matt Shelton - Passive Asset Detection System
Network scanners are a valuable resource in the security practitioner.s toolkit. They are used to actively probe a network in order to generate a snapshot of the current environment. However, they are not without limitations; they can be loud, resource intensive, and the results can be quickly outdated. During this presentation I will discuss how a passive scanner can be used to identify network traffic...
Keywords: Recon,Security,Conference
Downloads: 282
[movies]Action Force Recon - Nathan
Homemade WW2 movie
Keywords: Action Force Recon
Downloads: 255
[movies]Action Force Recon - Nathan
Homemade WW2 movie
Keywords: Action Force Recon
Downloads: 180
[texts]Ghost Recon Advanced Warfighter
Ghost Recon Advanced Warfighter achievement list, guides and news about the game. Tom Clancy's Ghost Recon Future Soldier is a near future military shooter video game, coming on Playstation 3 and Xbox 360 in 2012. Ghost Recon Advanced Warfighter Game Fixes, No-CD Game Fixes, No-CD Patches, No-CD Files, PC Game Fixes to enable you to play your PC Games without the CD in. == Ghost Recon Advanced Warfighter 2 The game takes place in 2014, just one year after the events of Ghost Recon Advanced Warfi...
Keywords: Ghost Recon Advanced Warfighter
Downloads: 36
[movies]Footprinting, scoping and recon with DNS, Google Hacking and Metadata - Adrian Crenshaw
This class covers recon work, showing the student how a pen-tester/attacker can use public information to learn more about an organization before they compromise it's security. Covered topics will include DNS tools (like Whois, NSlookup/Dig, Nmap -sL), Google Hacking using advanced search terms and Metadata in images and documents. Recorded for the Kentuckiana ISSA on March 21, 2009.
Keywords: hacking recon issa irongeek
Downloads: 159
[movies]Recon 2005 - Jonathan Levin - The Dark Side of Winsock
The Winsock SPI, or Service Provider Interface, has been a part of Winsock since the advent of version 2.0. It enables providers to extend the Winsock API transparently, by installing their own hooks and chains to application API calls. However, its formidable capabilities are not put to widespread use... aside from spyware. This lecture begins with a brief overview of the Windows TCP/IP Stack - reviewing the terminology, From NDIS to Winsock 2...
Keywords: Recon,Security,Conference,Winsock
Downloads: 652
[movies]Recon 2005 - Jonathan Westhues - Practical Attacks on a Prox Card
`Proximity cards' are commonly used as high-tech replacements for magstripe cards or metal keys: you hold the card within a few inches of the reader, and the door clicks open. They are interesting because they are routinely used to control access to property or services. These cards contain electronic circuitry that authenticates them to the reader using a radio link. Many such systems are designed with no security at all...
Keywords: Recon,Security,Conference,search
Downloads: 608
[texts]Jauja 23 ( Noviembre 1968)
Jauja 23 recon
Keywords: Jauja 23 recon
Downloads: 48
[texts]Jauja 30 ( Junio 1969)
Jauja 30 recon
Keywords: Jauja 30 recon
Downloads: 48
[texts]Jauja 32 ( Agosto 1969)
Jauja 32 recon
Keywords: Jauja 32 recon
Downloads: 44
[texts]Jauja 34 ( Octubre 1969)
Jauja 34 recon
Keywords: Jauja 34 recon
Downloads: 59
[texts]Jauja 29 ( Mayo 1969)
Jauja 29 recon
Keywords: Jauja 29 recon
Downloads: 40
[texts]Jauja 5 ( Mayo 1967)
Jauja 5 recon
Keywords: Jauja 5 recon
Downloads: 60
[texts]Jauja 21 ( Septiembre 1968)
Jauja 21 recon
Keywords: Jauja 21 recon
Downloads: 53
[texts]Jauja 20 ( Agosto 1968)
Jauja 20 recon
Keywords: Jauja 20 recon
Downloads: 50
[texts]20 Agosto 1968
Jauja 20 recon..
Keywords: Jauja 20 recon
Downloads: 115
[texts]Jauja 24 ( Diciembre 1968)
Jauja 24 recon
Keywords: Jauja 24 recon
Downloads: 57
[texts]Jauja 28 ( Abril 1969)
Jauja 28 recon
Keywords: Jauja 28 recon
Downloads: 45
[texts]Jauja 31 ( Julio 1969)
Jauja 31 recon
Keywords: Jauja 31 recon
Downloads: 42
[texts]Jauja 36 ( Diciembre 1969)
Jauja 36 recon
Keywords: Jauja 36 recon
Downloads: 66
[texts]Jauja 33 ( Septiembre 1969)
Jauja 33 recon
Keywords: Jauja 33 recon
Downloads: 41
[texts]Jauja 22 ( Octubre 1968)
jauja 22 recon.
Keywords: jauja 22 recon
Downloads: 53
[texts]Jauja 35 ( Noviembre 1969)
Jauja 35 recon
Keywords: Jauja 35 recon
Downloads: 51
[texts]6 Junio 1967
Jauja 6 recon..
Keywords: Jauja 6 recon
Downloads: 135
[texts]21 Septiembre 1968
Jauja 21 recon..
Keywords: Jauja 21 recon
Downloads: 120
[texts]28 Abril 1969
Jauja 28 recon..
Keywords: Jauja 28 recon
Downloads: 112
[texts]7 Julio 1967
Jauja 7 recon..
Keywords: Jauja 7 recon
Downloads: 140
[texts]Ghost Recon Future Soldier
As a member of the elite Ghost Recon, you are among the few who possess the power, the adaptability, and the cognitive fortitude of the future soldier. After a troubled development, this Future Soldier looks more like a military game of the past. May 22, 2012 Check out all the Ghost Recon Future Soldier achievements, latest news, previews, interviews, videos, screenshots and review from your number one...
Keywords: Ghost Recon Future Soldier
Downloads: 39
[texts]31 Julio 1969
Jauja 31 recon..
Keywords: Jauja 31 recon
Downloads: 120
[texts]34 Octubre 1969
Jauja 34 recon..
Keywords: Jauja 34 recon
Downloads: 112
[texts]Ghost Recon 2
Ghost Recon 2 cheats XBox, Ghost Recon 2 cheat codes XBox, XBox cheats, cheatcodes, hints, tips, strategy guides. G4tv.com is the ultimate resource for Tom Clancy's Ghost Recon Advanced Warfighter 2. Featuring 6 videos and trailers, release date and more. Tom Clancy's Ghost Recon Future Soldier is a near future military shooter video game, coming on Playstation 3 and Xbox 360 in 2012. G4tv.com is the ultimate resource for Tom Clancy's Ghost Recon Advanced Warfighter 2...
Keywords: Ghost Recon 2
Downloads: 62
[texts]10 Octubre 1967
Jauja 10 recon..
Keywords: Jauja 10 recon
Downloads: 129
[texts]19 Julio 1968
Jauja 19 recon..
Keywords: Jauja 19 recon
Downloads: 112
[movies]Recon 2011 - The Importance of Making a Good Impression by Babak Javadi and Deviant Ollam - Recon
(Bug: if the video is black use the QuickTime video instead) When you lose a key and call a locksmith, most of the time one of two things will happen... they will either pick the lock or drill it. In either case you're typically left with a door that's open, but not with the means of operating it again. What if we told you that you could not only open a lock but also /create a working key/ out of nothing at all in ways that are nearly undetectable...
Keywords: Recon; Lock Picking; Impressioning
Downloads: 241
[1] 2 3 4 5     Next    Last
Advanced search

Group results by:

> Relevance
Mediatype
Collection

Related mediatypes

texts
movies
audio